cyber security Crossword Puzzles

Cybersecurity and Compliance Week! 2025-11-10

Cybersecurity and Compliance Week! crossword puzzle
Across
  1. What emails are you supposed to report to IT?
  2. What is a security measure that requires at least two forms of identification?
  3. Who is a person who gains unauthorized access to computer systems?
  4. What is the process of converting data into a secure format?
  5. Who is the HR Reporting Officer?
  6. What are you supposed to do to your computer to not receive a blue HIPAA Hippo?
  7. What is the term for the agreement between covered entities and business associates?
  8. You are the first line of ___ in protection of DDID and AHS
Down
  1. What type of malicious software is designed to block access to a computer system until a sum of money is paid?
  2. What is a central concept of HIPAA that protects individuals' health information?
  3. Who is the HIPAA Privacy Officer?
  4. What is the term for malicious software?
  5. Who is the Security Officer?
  6. What are all DDID and AHS employees supposed to wear so it can be seen to adhere to security best practices?

14 Clues: Who is the Security Officer?Who is the HR Reporting Officer?Who is the HIPAA Privacy Officer?What is the term for malicious software?What emails are you supposed to report to IT?You are the first line of ___ in protection of DDID and AHSWhat is the process of converting data into a secure format?...

The Korean War 2022-06-22

The Korean War crossword puzzle
Across
  1. Capital of North Korea
  2. Action of not turning up to something in protest (Soviet Union at the Security Council)
  3. Name of vote needed to agree on military intervention by the UN Security Council
  4. Country banned from taking up its seat at the UN Security Council following its Communist takeover.
  5. Pocket that South Korean troops were pushed into by the North Korean invasion
  6. The name of the UN commander who was sacked by US President Harry Truman
  7. Leader of South Korea
Down
  1. Political system that operated in South Korea
  2. Political system that operated in North Korea
  3. Port city attacked by the UN Taskforce in September 1950
  4. The 38th ___________ separated North and South Korea

11 Clues: Leader of South KoreaCapital of North KoreaPolitical system that operated in South KoreaPolitical system that operated in North KoreaThe 38th ___________ separated North and South KoreaPort city attacked by the UN Taskforce in September 1950The name of the UN commander who was sacked by US President Harry Truman...

Cybersecurity Week 2022-10-14

Cybersecurity Week crossword puzzle
Across
  1. a service that creates a secure tunnel between your device and the internet
  2. a malicious software that spreads from one computer to another
  3. the process of verifying a users identity
  4. malicious code or software
Down
  1. taking readable plaintext, and converting it into ciphertext
  2. when attackers send malicious emails to trick people into a scam
  3. a software update that fixes bugs or updates security
  4. a security technique that requires multiple methods of authentication
  5. a malware that encrypts user data, and requires payment to get back
  6. a secret word or phrase that must be used to gain access to something
  7. a network security device that monitors traffic to or from your network

11 Clues: malicious code or softwarethe process of verifying a users identitya software update that fixes bugs or updates securitytaking readable plaintext, and converting it into ciphertexta malicious software that spreads from one computer to anotherwhen attackers send malicious emails to trick people into a scam...

Moderne Technologien 2016-11-22

Moderne Technologien crossword puzzle
Across
  1. verkörpert die künstliche Intelligenz
  2. Sucht
  3. Fokussierung der Aufmerksamkeit auf bestimmte Tätigkeit
Down
  1. Fähigkeit im Gehirn zu speichern
  2. Prozess des einsam Werdens
  3. absichtliche Bedrohen oder Belästigen auf Internet z.B.

6 Clues: SuchtProzess des einsam WerdensFähigkeit im Gehirn zu speichernverkörpert die künstliche Intelligenzabsichtliche Bedrohen oder Belästigen auf Internet z.B.Fokussierung der Aufmerksamkeit auf bestimmte Tätigkeit

CompTIA Cloud+ Ch. 9 2025-01-06

CompTIA Cloud+ Ch. 9 crossword puzzle
Across
  1. Tool for filtering network traffic.
  2. Reviewing logs to identify security issues.
  3. Adherence to legal and regulatory standards.
  4. Measures to protect data and systems.
  5. Securely connects users to a private network.
Down
  1. Digital document proving identity.
  2. Replacing sensitive data with non-sensitive equivalents.
  3. Authentication requiring more than one verification method.
  4. Encoding data to prevent unauthorized access.
  5. Ensuring data accuracy and consistency.
  6. Identity and Access Management.
  7. Updating software to fix vulnerabilities.

12 Clues: Identity and Access Management.Digital document proving identity.Tool for filtering network traffic.Measures to protect data and systems.Ensuring data accuracy and consistency.Updating software to fix vulnerabilities.Reviewing logs to identify security issues.Adherence to legal and regulatory standards.Encoding data to prevent unauthorized access....

Goodbye to Childhood 2021-10-20

Goodbye to Childhood crossword puzzle
Across
  1. change (para.1)
  2. disagreement (para.4)
  3. capable of thinking or acting for oneself (para.1)
  4. related to the body (para.2)
Down
  1. uncomfortably think of oneself as an object of the observation of others (para.3)
  2. feeling of security (para.4)
  3. very (para.4)
  4. resolution (para.4)
  5. related to the mind (para.3)
  6. small round marks on the skin (para.3)
  7. worrying (para.1)
  8. sudden increase (para.2)

12 Clues: very (para.4)change (para.1)worrying (para.1)resolution (para.4)disagreement (para.4)sudden increase (para.2)feeling of security (para.4)related to the mind (para.3)related to the body (para.2)small round marks on the skin (para.3)capable of thinking or acting for oneself (para.1)...

airport vocab 2025-04-15

airport vocab crossword puzzle
Across
  1. luggage
  2. emergency landing
  3. jet lag
  4. passport control
  5. flight number
  6. airport
  7. canceled
  8. toilets
Down
  1. boarding
  2. car rental
  3. metal detector
  4. security screening
  5. allowed
  6. ticket
  7. on board
  8. destination

16 Clues: ticketluggagejet lagallowedairporttoiletsboardingon boardcanceledcar rentaldestinationflight numbermetal detectorpassport controlemergency landingsecurity screening

ACCESS CONTROL 2025-05-29

ACCESS CONTROL crossword puzzle
Across
  1. Subway .......... are the example of physical access control.
  2. Unlocking a smartphone with a ..........scan is an example of information access control.
  3. The guest’s keycard ........them access to their room, the guest elevator, and the pool
  4. Information access control ........... access to data and the software used to manipulate that data.
  5. Physical access control is a set of ............ to control who is granted access to a physical location.
  6. a hotel .......... scanner only grants access to authorized guests who have a hotel key.
Down
  1. The security practice of confirming that someone is who they claim to be.
  2. financial holdings
  3. the process of determining which level of access each user is granted.
  4. ............ access control establishes strict security policies for individual users and the resources, systems, or data they are allowed to access.
  5. worker
  6. Security ..........is an official determination that an individual may access information
  7. extra

13 Clues: extraworkerfinancial holdingsSubway .......... are the example of physical access control.the process of determining which level of access each user is granted.The security practice of confirming that someone is who they claim to be.The guest’s keycard ........them access to their room, the guest elevator, and the pool...

Chapter 2 Crossword 2025-09-29

Chapter 2 Crossword crossword puzzle
Across
  1. actors
  2. sharing
  3. race
  4. cohesion
  5. analysis
  6. dilemma
  7. of power
  8. dilemma
  9. system
Down
  1. Treaty.
  2. powers
  3. powers
  4. Morality
  5. transition theory
  6. interest
  7. system.
  8. of Ideas.

17 Clues: raceactorspowerspowerssystemTreaty.sharingdilemmasystem.dilemmacohesionMoralityanalysisinterestof powerof Ideas.transition theory

Realism 2023-10-04

Realism crossword puzzle
Across
  1. Thinker that established the different types of balance of power: unpolar, bipolar, multipolar.
  2. No hierarchically superior, coercive authority.
  3. Thinker that placed that the international system is anarchic.
  4. Also called structural realism,focuses its studies in the analysis of the structure of the international system.
  5. Thinker that established the dynamism in realism-history = cycles of dominant powers.
  6. Sum zero game, where a gain in security for one state means a loss for another.
  7. balancing Gaining power by building up its own military resources.
  8. Type of realists that say that war is an inevitable result to balancing
  9. A process explained by offensive realists as joining an unlikely ally to avoid war with it.
  10. According to realists, this is the states' main focus.
Down
  1. For this thinker, the state is the principal actor, it is unitary, rational and focused on protecting themselves.
  2. balancing Gaining power by allying with other states.
  3. Focuses mostly on the state and the international system.
  4. How much more one state gains over another.

14 Clues: How much more one state gains over another.No hierarchically superior, coercive authority.balancing Gaining power by allying with other states.According to realists, this is the states' main focus.Focuses mostly on the state and the international system.Thinker that placed that the international system is anarchic....

Accounting: Payroll/Tax 2025-06-14

Accounting: Payroll/Tax crossword puzzle
Across
  1. Taxes paid (medicare or social security)
  2. For journalizing earnings in payroll
  3. rates When employers contribute equal amount to the retirement plan as employee
  4. Journalizing income tax
  5. A common retirement plan that deducts a select amount regularly
  6. Paid every 3 months
Down
  1. Journalizing social security
  2. Paid every month
  3. Your actual salary after deductions
  4. Paid every two weeks
  5. Paid every week

11 Clues: Paid every weekPaid every monthPaid every 3 monthsPaid every two weeksJournalizing income taxJournalizing social securityYour actual salary after deductionsFor journalizing earnings in payrollTaxes paid (medicare or social security)A common retirement plan that deducts a select amount regularly...

Jenifer Ximena Hernandez Morales 2013-05-01

Jenifer Ximena Hernandez Morales crossword puzzle
Across
  1. security.
  2. to the average employee.
  3. and network security help to keep data and equipment
  4. their data and computer
Down
  1. computer can be harmed
  2. are secure.
  3. technician to try to gain entry into a facility
  4. might repair, adjust, and install equipment.
  5. by attackers
  6. primary responsibilities of a technician include data and

10 Clues: security.are secure.by attackerscomputer can be harmedtheir data and computerto the average employee.might repair, adjust, and install equipment.technician to try to gain entry into a facilityand network security help to keep data and equipmentprimary responsibilities of a technician include data and

TTS Firewall Rizky A Dahlan 2022-11-09

TTS Firewall Rizky A Dahlan crossword puzzle
Across
  1. Mensyaratkan bahwa informasi tersedia untuk pihak yang memiliki wewenang ketika dibutuhkan adalah definisi dari …
  2. firewall yang hanya bisa melindungi satu komputer adalah firewall berbasis...
  3. Perubahan terhadap tampilan suatu website secara illegal disebut..
  4. fungsi dari firewall untuk ... Data dari Hacker dan Pengguna Tak Bertanggung Jawab
  5. kelebihan firewall berbasis jaringan adalah menjaga jaringan secara...
  6. berapakah element pada host hardening …
Down
  1. firewall terbagi menjadi ... jenis
  2. Yang termasuk jenis metode enkripsi adalah …
  3. Terdiri dari database security, data security, dan device security adalah keamanan di level …
  4. ....adalah sistem yang dirancang untuk mencegah akses yang tidak sah yang ingin memasuki jaringan pribadi
  5. arti dari kata firewall
  6. Firewall untuk melakukan multiplexing terhadap lalu lintas dari jaringan internal untuk kemudian menyampaikannya kepada jaringan yang lebih luas (MAN, WAN atau Internet) seolah-olah paket tersebut datang dari sebuah alamat IP atau beberapa alamat IP disebut …
  7. firewall bekerja dengan cara ... seluruh data yang masuk

13 Clues: arti dari kata firewallfirewall terbagi menjadi ... jenisberapakah element pada host hardening …Yang termasuk jenis metode enkripsi adalah …firewall bekerja dengan cara ... seluruh data yang masukPerubahan terhadap tampilan suatu website secara illegal disebut..kelebihan firewall berbasis jaringan adalah menjaga jaringan secara......

Cybersecurity Awareness Month 2023 2023-08-29

Cybersecurity Awareness Month 2023 crossword puzzle
Across
  1. This security tool identified and removes malicious programs
  2. The individuals who control access to people, data, and systems
  3. This attack occurs when cybercriminals research and track which sites employees visit the most
  4. What should you do when a workstation or device is no longer in use
  5. Any scenario that triggers emotions should also trigger your __________
Down
  1. Stealing money is the main goal behind this type of malware
  2. Failure to run these equals failure to patch security vulnerabilities
  3. You can help fight cybercrime by becoming a ________________
  4. ____are the last line of defense
  5. Kwiktrip's password policy requires that coworkers change their passwords _____days
  6. The future of security is____,not machines
  7. This attack occurs when someone sneaks into a secured area behind someone else
  8. This dangerous attack targets specific people or organization, often with custom made email or messages
  9. These are designed to maintain the security of everyone associated with an organization

14 Clues: ____are the last line of defenseThe future of security is____,not machinesStealing money is the main goal behind this type of malwareYou can help fight cybercrime by becoming a ________________This security tool identified and removes malicious programsThe individuals who control access to people, data, and systems...

InfoSec Puzzle Quest 2025-09-04

InfoSec Puzzle Quest crossword puzzle
Across
  1. A type of malicious software that can replicate and spread.
  2. Security Protecting data and systems hosted on remote servers.
  3. Following rules, regulations, and standards in cybersecurity.
  4. A formal review of systems and processes to ensure security and compliance.
  5. Manipulating people into giving up confidential information.
Down
  1. The practice of protecting systems, networks, and data from digital threats.
  2. Ensuring data is accurate and has not been tampered with.
  3. Surfing A sneaky way to steal information by watching someone type their password.
  4. An unexpected event that compromises the integrity or availability of data.
  5. Software designed to detect and remove malicious programs.

10 Clues: Ensuring data is accurate and has not been tampered with.Software designed to detect and remove malicious programs.A type of malicious software that can replicate and spread.Manipulating people into giving up confidential information.Following rules, regulations, and standards in cybersecurity....

Un Viaje Memorable 2023-04-19

Un Viaje Memorable crossword puzzle
Across
  1. suitcase / luggage
  2. plane
  3. window
  4. aisle
  5. terminal
  6. airport
  7. metal detector
  8. flight attendant
  9. ticket
  10. economy class seat
Down
  1. boarding pass
  2. seat belt
  3. screen / sign
  4. passport
  5. security control / check
  6. seat
  7. passenger
  8. first class seat

18 Clues: seatplaneaislewindowticketairportpassportterminalseat beltpassengerboarding passscreen / signmetal detectorfirst class seatflight attendantsuitcase / luggageeconomy class seatsecurity control / check

słówka 2025-06-24

słówka crossword puzzle
Across
  1. spokój
  2. zranić
  3. odwracać uwagę
  4. kaloryfer
  5. ukraść
  6. spokojny/pokojowe
  7. pewien
  8. strach
Down
  1. at...... w końcu
  2. ochrona
  3. kupić (nabyć)
  4. zagrożenie
  5. at...... przynajmniej
  6. według
  7. wchodzić

15 Clues: spokójzranićukraśćwedługpewienstrachochronawchodzićkaloryferzagrożeniekupić (nabyć)odwracać uwagęat...... w końcuspokojny/pokojoweat...... przynajmniej

Qatar Cross Word 2021-11-24

Qatar Cross Word crossword puzzle
Across
  1. Slogan Raised In Qatar
  2. Thing related to Cyber bullying
  3. capital of independent Palestinian state
Down
  1. Thing that happened with Saudi Arabia
  2. Historic Visit To Break Blockade
  3. Full Form of QNA

6 Clues: Full Form of QNASlogan Raised In QatarThing related to Cyber bullyingHistoric Visit To Break BlockadeThing that happened with Saudi Arabiacapital of independent Palestinian state

ICT - Security and Communication 2017-11-20

ICT - Security and Communication crossword puzzle
Across
  1. A type of protocol that allows data to be sent and received securely over the internet.
  2. Software that gathers data by monitoring key press on the user/s keyboard.
  3. Malicious code installed a user's computer where the users are redirected to a fake website without their knowledge.
  4. Refers to the need to respect other user's views and display common courtesy when posting views online.
  5. Web applications or website that allow users to create and edit web pages using any web browser.
  6. A combination of letters, symbols and numbers that protects a system and allows a user to login.
  7. The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, etc.
  8. Authentication that relies on certain unique characteristics of human beings.
  9. Uses SMS system of mobile phones to send out fake text messages.
  10. Computer network based on internet technology but designed to meet the internal needs for sharing info within a single organisation.
  11. Refers to safety when using the internet like keeping personal data safe.
  12. A cloud where the storage environment where the customer/client and cloud storage provider are different companies
  13. Sits between the user's computer and an external network and filters information coming in and out of the user's computer.
Down
  1. This form of phishing uses a voice mail message to trick users into calling the number contained in the message.
  2. Unsolicited email sent over the internet.
  3. A cloud where the storage is provided by a dedicated environment behind a company firewall.
  4. Used to verify that data comes from a secure and trusted source.
  5. Similar to blogs but are most often used on social networking sites to make shrt, frequent posts.
  6. Used to protect data in case it has been hacked or accessed illegally. It makes the data meaningless unless the recipient has the necessary key.
  7. Creator sends out legitimate-looking emails to target users and fooled into giving their personal data.
  8. Program that can replicate itself with the intention of deleting or corrupting files in a computer system.
  9. Personal internet journals where the writer will type in their observations and opinions on certain topics.
  10. World wide collection of networks that allow users to chat, send and receive emails, do video calls, etc.
  11. The act of gaining unauthorized access to a computer system.
  12. Damage to fingers and wrists caused by continuous use of keyboard or repetitive clicking of mouse buttons.

25 Clues: Unsolicited email sent over the internet.The act of gaining unauthorized access to a computer system.Used to verify that data comes from a secure and trusted source.Uses SMS system of mobile phones to send out fake text messages.Refers to safety when using the internet like keeping personal data safe....

Fnaf Security Breach Crossword 2022-02-12

Fnaf Security Breach Crossword crossword puzzle
Across
  1. Stuns only one animatronic at a time
  2. All animatronics need this to keep moving around
  3. Mexican bear
  4. The arcade game where you see a glitched version of the daycare attendant
  5. This is what the animatronics are
  6. You broke the rules
  7. An attraction that is constantly under maintenance
  8. The gator's full name
  9. No longer allowed inside
  10. A warning given to the main character by the daycare attendant
  11. The player uses this to scramble the yellow console that gives out passes
  12. Needed to get into the daycare
  13. A cool place for a cool sport
  14. An attraction with no animatronic
  15. The daycare attendant says this twice when he throws you out of the daycare or if you try to enter again
  16. An attraction that has a statue of three animatronics inside
  17. The main villain that makes an appearance in an area below the pizzaplex
  18. Freddy's way of saying 'good job'
  19. Loves to entertain children at the Daycare
  20. Survive until then
  21. Moon says this before he starts chasing you
Down
  1. Every horror game needs this
  2. The part you take from the gator to upgrade Freddy
  3. This animatronic's catchphrase is 'Rock and Roll'
  4. Makes an appearance in cardboard cutouts, but never as an animatronic in the game
  5. The animatronics patrolling the halls
  6. The child you play as in Security Breach
  7. The name of the building
  8. Eats garbage
  9. Stuns a large group of animatronics at a time
  10. The tallest animatronic in the game
  11. The bear misses him
  12. A bunny that is after the player in the game
  13. You find these throughout the game
  14. Defend the galaxy
  15. In charge of nap time in the Daycare
  16. The part you take from the chicken to upgrade Freddy
  17. Where the main four perform
  18. Where the player can upgrade Freddy
  19. The nightguard
  20. Don't get lost
  21. The father figure of the entire game
  22. The instrument the gator plays
  23. The name of the game
  24. Bright and vibrant colors
  25. Take a map
  26. Has a very big ego, but is self conscious
  27. The small animatronic that chases you through the vents
  28. The part you take from the wolf to upgrade Freddy
  29. The instrument the wolf plays
  30. Use this to see security cams, talk to Freddy, view missions, or see confidential messages towards Fazbear Entertainment
  31. The instrument the chicken plays

52 Clues: Take a mapMexican bearEats garbageThe nightguardDon't get lostDefend the galaxySurvive until thenYou broke the rulesThe bear misses himThe name of the gameThe gator's full nameThe name of the buildingNo longer allowed insideBright and vibrant colorsWhere the main four performEvery horror game needs thisA cool place for a cool sport...

Security Analysis & Portfolio Management 2022-05-15

Security Analysis & Portfolio Management crossword puzzle
Across
  1. The ability to buy or sell an asset quickly at a known price.
  2. The --------------------frontier represents the set of portfolios with the maximum rate of return for every given level of risk, or the minimum risk for every level of return.
  3. The ---------------------- component represents the portion of the portfolio’s actual return beyond that available to an unmanaged portfolio with identical systematic risk and is used to assess the manager’s investment prowess.
  4. --------------------ratio measures the average return in excess of that of a benchmark portfolio divided by the standard deviation of this excess return.
  5. The market ------------------is used as a benchmark to evaluate the performance of funds.
  6. ------------------------was one of the originators of Capital Asset Pricing model.
  7. The stop------------------order is a conditional market order to buy the stock if it increases to a specified price.
  8. ------------------------laid the foundations to the Portfolio theory.
  9. The ----------------------theorem suggests that investment and financing are two different decisions.
Down
  1. The APT differs from the CAPM because the APT recognizes multiple ---------------------risk factors.
  2. Performance ------------------analysis attempts to distinguish the source of the portfolio’s overall performance.
  3. A -------------form EMH is when prices reflect all historical information.
  4. ------------------of returns is the measure of the degree to which rates of return move together relative to the individual mean values over time.
  5. A ---------------sale is a transaction in which the seller sells overpriced stock which he/she does not own but borrows from another investor through a broker.
  6. The --------------market is used for lending and borrowing short-term funds.
  7. The --------------measure is calculated as excess returns per unit of systematic risk.
  8. The --------------------market line is the graphical representation of CAPM.
  9. -------------------measure calculates the portfolio’s average return in excess of a user-selected minimum acceptable return threshold per unit of downside risk.
  10. --------------------measure represents the average excess return of the portfolio above that predicted by an asset pricing model.
  11. The market ------------------in its’ pure form means shifting funds between a market index portfolio and safe assets such as T-bills or money market funds depending on whether the market as a whole is expected to outperform the safe asset.

20 Clues: The ability to buy or sell an asset quickly at a known price.------------------------laid the foundations to the Portfolio theory.A -------------form EMH is when prices reflect all historical information.The --------------market is used for lending and borrowing short-term funds....

Cryptography And Network Security 2023-09-18

Cryptography And Network Security crossword puzzle
Across
  1. In base 26, multiplication of YES by NO gives –
  2. _______ is the science and art of transforming messages to make them secure and immune to attacks
  3. The ciphers of today are called round ciphers because they involve---------round
  4. ----------round constants (RCs) are required in Whirlpool?
  5. ---------is not a type of symmetric-key cryptography technique?
  6. Divide (HAPPY)26 by (SAD)26. We get quotient –
  7. The ________ is the message after transformation
  8. ---------round provides linear diffusion in the Whirlpool Algorithm?
  9. In symmetric-key cryptography, the key locks and unlocks the box is
  10. The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two parties are not
Down
  1. . A/an ________ algorithm transforms ciphertext to plaintext
  2. In asymmetric key cryptography, the private key is kept by ________
  3. The shift cipher is sometimes reffered to as a ---------
  4. What is the number of round computation steps in the SHA-256 algorithm?
  5. can be considered as the class of computer threats
  6. The ________ is the original message before transformation
  7. Another name for the Whirlpool key is
  8. is considered as the unsolicited commercial email?
  9. An asymmetric-key (or public-key) cipher uses
  10. Symmetric-key cryptography started thousands of years ago when people needed to exchange

20 Clues: Another name for the Whirlpool key isAn asymmetric-key (or public-key) cipher usesDivide (HAPPY)26 by (SAD)26. We get quotient –In base 26, multiplication of YES by NO gives –The ________ is the message after transformationcan be considered as the class of computer threatsis considered as the unsolicited commercial email?...

Chapter 7 Security Plus 2024-10-03

Chapter 7 Security Plus crossword puzzle
Across
  1. An access control scheme that is the least restrictive
  2. injects stolen username and password across multiple websites
  3. Granting or denying approval to use specific resources
  4. The ability of systems to exchange information
  5. small device that looks like a thumb drive which can be used for verification
  6. enables users to access a network resource through a directory service
  7. small number of passwords used when trying several different user accounts
  8. Adding a random string to a hash algorithm for enhanced security
  9. A key pair “burned” into a security key
  10. features and characteristics of the individual
  11. Removing user accounts
  12. An access control scheme that is the most restrictive
  13. password attack attempting thousands of combinations per second
Down
  1. Single sign-on for networks owned by different organizations
  2. software designed to break passwords
  3. Using more than one type of authentication credential
  4. Requiring the user to provide proof that they are the unique user.
  5. Granting access that is limited
  6. key stretching algorithms
  7. Standard preconfigured passwords
  8. evidence or proof of something
  9. allows secure web domains to exchange user authentication and authorization data
  10. The point in time when a password is no longer valid
  11. An open-source federation framework
  12. provide control over user validation and the resources that may be accessed

25 Clues: Removing user accountskey stretching algorithmsevidence or proof of somethingGranting access that is limitedStandard preconfigured passwordsAn open-source federation frameworksoftware designed to break passwordsA key pair “burned” into a security keyThe ability of systems to exchange informationfeatures and characteristics of the individual...

Chapter 4 Security Plus 2024-09-10

Chapter 4 Security Plus crossword puzzle
Across
  1. multiple CAs that sign digital certificates
  2. management of keys and digital certificates at scale
  3. An certificate that uses an asterisk to cover multiple subdomains
  4. The entity that is responsible for digital certificates
  5. one master CA called the root
  6. associate a user’s identity to a public key
  7. confidence in or reliance on another person/entity
  8. published set of rules that govern operation of a PKI
  9. A process in which keys are managed by a third party
  10. A protocol suite for securing Internet Protocol (IP) communications
  11. securely distributing encryption keys between two parties
  12. Tracing a certificate back to the highest level of a CA
  13. An entity that is trusted by others
  14. The common file types for storing X.509 certificates
  15. A list of certificate serial numbers that have been revoked
  16. an extension to X.509 that allows various values to be associated with a security certificate
  17. Data that is encapsulated within a secure outer shell
Down
  1. replaces SSL
  2. Encrypts only the payload preserves the original IP header
  3. digitally sign a program
  4. M of N
  5. A method of controlling public keys
  6. publicly accessible centralized directory of digital certificates
  7. performs a real-time lookup of a certificate’s status
  8. A request submitted to a Certificate Authority for an TLS/SSL certificate
  9. Encrypts the entire IP packet and encapsulates it within a new IP packet
  10. web servers send queries to the OCSP Responder

27 Clues: M of Nreplaces SSLdigitally sign a programone master CA called the rootA method of controlling public keysAn entity that is trusted by othersmultiple CAs that sign digital certificatesassociate a user’s identity to a public keyweb servers send queries to the OCSP Responderconfidence in or reliance on another person/entity...

Chapter 10 Security Plus 2024-10-23

Chapter 10 Security Plus crossword puzzle
Across
  1. A framework for transporting authentication protocols
  2. uses digital certificates for authentication
  3. Unauthorized users could listen in on communications between RFID tags and readers
  4. The encryption protocol used for WPA2
  5. accesses unauthorized information from a Bluetooth connection
  6. An in-depth examination and analysis of a WLAN site
  7. securely tunnels any credential form for authentication using TLS
  8. A wireless attack in which false deauthentication
  9. can be used to detect a rogue AP
  10. standards used to transmit information from tags to a proximity reader
  11. not recommended as a security protection for SSID
  12. tool that provides a visual representation of the wireless signal
Down
  1. web page that is displayed to users when they attempt to access a public network
  2. sends unsolicited messages to Bluetooth-enabled devices
  3. commonly called Wi-Fi
  4. usage in contactless payments
  5. A wireless technology that uses short-range radio frequency
  6. An EAP method designed to simplify the deployment of 802.1x
  7. Intentionally flooding the radio frequency spectrum
  8. 200 milliwatts (mW)
  9. minimum amount of wireless signal should extend beyond the walls of the building
  10. An AP set up by an attacker to mimic an authorized AP
  11. can mitigate against man-in-the-middle (MITM) attacks and is an optional WPA3 enhancement
  12. A unique name identifying a Wi-Fi network
  13. IEEE 802.1x standard
  14. no longer support WEP
  15. An unauthorized AP that allows an attacker to bypass many of the network security

27 Clues: 200 milliwatts (mW)IEEE 802.1x standardcommonly called Wi-Fino longer support WEPusage in contactless paymentscan be used to detect a rogue APThe encryption protocol used for WPA2A unique name identifying a Wi-Fi networkuses digital certificates for authenticationA wireless attack in which false deauthentication...

Appsec and AI Security 2025-06-19

Appsec and AI Security crossword puzzle
Across
  1. The paid add-on that includes vulnerabilities, policies, and red-teaming (15 letters)
  2. AI that is designed to interact with humans using natural language (17 letters)
  3. Pre-built libraries, tools, and services that provide the necessary infrastructure to develop, train, and deploy AI systems efficiently (11 letters)
  4. A document that lists all components in a software application (4 letters)
  5. Single word to encompass the fundamental building blocks that enable an AI system to perform its functions, such as AI models, frameworks, agents, or architectures like RAGs (13 letters)
  6. The unauthorized extraction of data from a system (15 letters)
  7. Analysis of application source code to identify security vulnerabilities before deployment (4 letters)
  8. Risks such as hallucinations, data leakage, prompt injections, and biases that are present only in the context of a given application and how it is configured, connected, and customized (19 letters)
  9. A standardized set of rules that helps an AI remember what's been said or what's happening right now (18 letters)
  10. Development environments where AI capabilities are deeply integrated throughout the software development lifecycle for tasks like code generation, debugging, and refactoring (12 letters)
  11. Analysis of third-party and open-source components in applications (3 letters)
Down
  1. Mathematical structures trained to perform specific tasks by learning patterns in data (9 letters)
  2. A type of AI framework that enhances LLMs by retrieving relevant external data to generate more accurate, factual, and contextual responses (28 letters)
  3. Name of the overall product, when referring to Mend AI capabilities in the platform and Mend AI Premium together (7 letters)
  4. Technique to manipulate AI systems by crafting inputs that bypass security controls (14 letters)
  5. Unauthorized use of AI tools and components by employees/teams without formal approval (10 letters)
  6. The name of our platform, fundamentally re-architected to operate in a world where AI is integral (18 letters)
  7. Autonomous AI entities that perceive their environment, make decisions, and take actions to achieve specific goals, often without human intervention (9 letters)
  8. When AI systems generate content that isn't grounded in factual information (13 letters)
  9. Applications or processes that integrate and utilize artificial intelligence components like AI models, AI agents, RAGs and MCPs (10 letters)

20 Clues: The unauthorized extraction of data from a system (15 letters)A document that lists all components in a software application (4 letters)Analysis of third-party and open-source components in applications (3 letters)AI that is designed to interact with humans using natural language (17 letters)...

IT Systems and Security 2025-07-21

IT Systems and Security crossword puzzle
Across
  1. Ranking tasks or risks by importance
  2. Public perception that can be damaged by breaches
  3. A fine or consequence for non-compliance
  4. I am harmful
  5. System settings that affect performance
  6. Programs and applications
  7. loss Critical information is erased or inaccessible
  8. The users who interact with and operate in an environment
  9. How often a certain risk or issue occurs
  10. Ordering risks based on severity and likelihood
  11. Numerical estimate of potential loss
  12. Unintentional harmful events affecting systems
  13. You need to identify this before setting up an IS
  14. Likelihood of a specific event occurring
  15. Flaws that can be exploited by threats
Down
  1. Organized collections of structured information
  2. Physical parts of a computer or system
  3. I am important for your network
  4. Example: Routers, switches, cables in connectivity, etc.
  5. disasters Earthquakes or floods that disrupt systems
  6. Enhancements to improve system
  7. Evaluation of consequences of an incident
  8. What do you do after completing a task?
  9. Gaps in security or system design
  10. Series of steps to accomplish tasks in systems
  11. System A coordinated set of components to manage data
  12. What else do you need other than physical components?
  13. Period when a system is unavailable/offline

28 Clues: I am harmfulPrograms and applicationsEnhancements to improve systemI am important for your networkGaps in security or system designRanking tasks or risks by importanceNumerical estimate of potential lossPhysical parts of a computer or systemFlaws that can be exploited by threatsSystem settings that affect performance...

Digital citizenship topics 2017-09-08

Digital citizenship topics crossword puzzle
Across
  1. legal use of copyrighted material
  2. playing nice online
  3. rules you should be following when you are online
  4. use passwords that only you would understand
  5. keeping your accounts private
  6. the buying and selling of items online
Down
  1. the trail left in cyber space that never goes away
  2. doing the right thing online
  3. dont talk to people you have never met before
  4. being mean to people repetitively online
  5. using the internet for the right purposes
  6. using someone elses work and taking credit for it
  7. apps used to share information and talk with others
  8. you can put anything on the internet for people to use

14 Clues: playing nice onlinedoing the right thing onlinekeeping your accounts privatelegal use of copyrighted materialthe buying and selling of items onlinebeing mean to people repetitively onlineusing the internet for the right purposesuse passwords that only you would understanddont talk to people you have never met before...

Middle Childhood 2017-10-27

Middle Childhood crossword puzzle
Across
  1. Realizing things can be arranged in a logical series.
  2. Child over 95th percentile for their age group.
  3. Type of bullying including hitting.
  4. Type of bullying that effects peer relationships.
  5. Family with relatives living with parents and children.
Down
  1. Organizing things into groups based off characteristics.
  2. Child over 85th percentile weight for their age group.
  3. Family with two married parents and children.
  4. Type of bullying done through words.
  5. These children typically bully through their words.
  6. Unusual difficulty with reading.
  7. These children bully more physically
  8. One husband and two or more wives in a family.
  9. Type of bullying done through technology.

14 Clues: Unusual difficulty with reading.Type of bullying including hitting.Type of bullying done through words.These children bully more physicallyType of bullying done through technology.Family with two married parents and children.One husband and two or more wives in a family.Child over 95th percentile for their age group....

Bullying 2017-02-19

Bullying crossword puzzle
Across
  1. kicking and Pushing
  2. ask classmates in bad modos for money or lunch
  3. don`t talk or play with others
  4. say bad words and offences
Down
  1. say or act in a bad way affecting others
  2. bad use of technology
  3. do bad face moviments

7 Clues: kicking and Pushingbad use of technologydo bad face movimentssay bad words and offencesdon`t talk or play with otherssay or act in a bad way affecting othersask classmates in bad modos for money or lunch

BANKING 2025-04-23

BANKING crossword puzzle
Across
  1. - descubierto
  2. - extracto bancario
  3. - cuota
  4. - sucursal
  5. - extraer
  6. - cuenta
Down
  1. - préstamo
  2. - depositar
  3. - transferir
  4. - garantía
  5. - saldo
  6. - emitir
  7. - cajero

13 Clues: - cuota- saldo- emitir- cajero- cuenta- extraer- préstamo- garantía- sucursal- depositar- transferir- descubierto- extracto bancario

Splunk Education Crossword for Enterprise Security 2021-06-18

Splunk Education Crossword for Enterprise Security crossword puzzle
Across
  1. One type of thresholding in a correlation search
  2. Security _______, main high level dashboard showing current notable events
  3. The engine that is used to search for multiple notable events and creates a specific type of event when they are found
  4. One of the things that the CIM does
  5. Used to hide events from incident review
  6. A chronological collection of activities and notes to help determine the root cause of a threat or breach
  7. A Splunk app that can be used to capture traffic without the use of an agent
  8. One of many CIM compliant data models showing data such as success and failure
Down
  1. A person, host, filetype or url used in investigations
  2. A cumulative metric to help determine what assets and identities are worth investigating
  3. Used within risk to map to a known security framework
  4. You can add assets, identities and websites to this to highlight their use within your systems
  5. Search used to discover security anomalies within your data
  6. A type of event which can be triggered from a correlation search
  7. You should enable this on all data models being used by ES
  8. Calculated using severity and priority
  9. When deploying, you need one of these dedicated to ES
  10. Imperative to prevent false positives and negatives showing within your correlation searches

18 Clues: One of the things that the CIM doesCalculated using severity and priorityUsed to hide events from incident reviewOne type of thresholding in a correlation searchUsed within risk to map to a known security frameworkWhen deploying, you need one of these dedicated to ESA person, host, filetype or url used in investigations...

bullying-by Harvey.B 2023-11-28

bullying-by Harvey.B crossword puzzle
Across
  1. when you be unkind to a person
  2. bulling when you bully someone online
  3. when you are really angry
  4. when you make someone attack you
Down
  1. this is called when a person watches someone get bullied
  2. stander when you tell on the person when they are bulling someone
  3. when you are getting hurt
  4. when you bully someone for there skin color
  5. when you are the one being bullied

9 Clues: when you are getting hurtwhen you are really angrywhen you be unkind to a personwhen you make someone attack youwhen you are the one being bulliedbulling when you bully someone onlinewhen you bully someone for there skin colorthis is called when a person watches someone get bulliedstander when you tell on the person when they are bulling someone

ethan is gay 2024-12-25

ethan is gay crossword puzzle
Across
  1. the toys emmi and ethan played with when she was very small
  2. ethans favorite animal
  3. a beautiful french lover
  4. our forbidden stinky secret (hint: in the Meijer parking lot)(2 words)
  5. the best gift ethan got for emmi
Down
  1. a creepy boy who had a crush on emmi so ethan cyber bullied him (2 words)
  2. ethans favorite barbie movie
  3. our fluffy emotionally charged disagreement
  4. wanna go shoot some ____?
  5. where emmi found love and lost it (digitally)
  6. acronym for ethans favorite childhood midnight snack

11 Clues: ethans favorite animala beautiful french loverwanna go shoot some ____?ethans favorite barbie moviethe best gift ethan got for emmiour fluffy emotionally charged disagreementwhere emmi found love and lost it (digitally)acronym for ethans favorite childhood midnight snackthe toys emmi and ethan played with when she was very small...

GO EXPO Crossword 2025-10-11

GO EXPO Crossword crossword puzzle
Across
  1. Foundation for strong teamwork
  2. Where you can find AQS's biggest solar installation
  3. Common entry point for cyber attacks
  4. Klikk delivery promise
  5. Technology-enabled support service that uses devices and sensors to help people live safely and independently in their own homes
Down
  1. Brain of a solar energy system
  2. Driving a digital Malta, where no-one is left behind
  3. Cybersift flagship product
  4. Heating, ventilation, and air conditioning
  5. One of the three benefits of SENS
  6. The second of BMIT’s 3 Es

11 Clues: Klikk delivery promiseThe second of BMIT’s 3 EsCybersift flagship productBrain of a solar energy systemFoundation for strong teamworkOne of the three benefits of SENSCommon entry point for cyber attacksHeating, ventilation, and air conditioningWhere you can find AQS's biggest solar installationDriving a digital Malta, where no-one is left behind...

BULLYING 2024-07-25

BULLYING crossword puzzle
Across
  1. What if you are being cyber bullied??
Down
  1. What to do if someone else is getting bullied on the internet?
  2. What to do if you see a person being bullied
  3. If the cyber bullying persist you?

4 Clues: If the cyber bullying persist you?What if you are being cyber bullied??What to do if you see a person being bulliedWhat to do if someone else is getting bullied on the internet?

Cyber 2024-05-03

Cyber crossword puzzle
Across
  1. Flying mammal
  2. Has a trunk
  3. Man's best friend
Down
  1. Large marsupial
  2. Likes to chase mice

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

cyber 2025-11-19

cyber crossword puzzle
Across
  1. Large marsupial
  2. Likes to chase mice
Down
  1. Has a trunk
  2. Flying mammal
  3. Man's best friend

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

Types of Bullying 2013-08-12

Types of Bullying crossword puzzle
Across
  1. Using information and communication technologies to bullying someone.
  2. Treating someone like an outcast.
  3. Secretly hurting a person such as spreading rumours.
  4. Affecting someone's relationship, excluding, making the person feel left out etc.
Down
  1. Name calling, saying hurtful things.
  2. Hurting someone.
  3. Hurting a person's feelings.

7 Clues: Hurting someone.Hurting a person's feelings.Treating someone like an outcast.Name calling, saying hurtful things.Secretly hurting a person such as spreading rumours.Using information and communication technologies to bullying someone.Affecting someone's relationship, excluding, making the person feel left out etc.

Computing Test 2019-06-17

Computing Test crossword puzzle
Across
  1. hackers putting bad things in files to hack you
  2. the divide between people with internet and not
  3. hacking
  4. a law or a set of laws
  5. bullying online
Down
  1. intelligence that is not human
  2. someone who has data stored about them

7 Clues: hackingbullying onlinea law or a set of lawsintelligence that is not humansomeone who has data stored about themhackers putting bad things in files to hack youthe divide between people with internet and not

Internet Term Crossword Puzzle 2013-09-03

Internet Term Crossword Puzzle crossword puzzle
Across
  1. advertise
  2. security
  3. criticism
  4. linking files
  5. communicate
  6. saving
  7. filing program
  8. typing
Down
  1. file,edit,view
  2. letters
  3. hacking
  4. main page
  5. testing program
  6. significance
  7. posting comments

15 Clues: savingtypinglettershackingsecurityadvertisecriticismmain pagecommunicatesignificancelinking filesfile,edit,viewfiling programtesting programposting comments

TRANSFORM 2022-12-02

TRANSFORM crossword puzzle
Across
  1. money
  2. opportunity cost
  3. answer
  4. suppor
  5. doing better
  6. to Information.
  7. in business
Down
  1. eveeryone
  2. bette
  3. less cost
  4. Fraude
  5. data
  6. quickest
  7. data base
  8. of Mobility.

15 Clues: datamoneybetteFraudeanswersupporquickesteveeryoneless costdata basein businessof Mobility.doing betterto Information.opportunity cost

Vocabulary Recap ch 9 & theme vocabulary human welfare & religion 2025-09-10

Vocabulary Recap ch 9 & theme vocabulary human welfare & religion crossword puzzle
Across
  1. kevyt/pinnallinen
  2. avoliitto
  3. parish
  4. kyyristyä
  5. nervously
  6. social security
  7. (arvo)merkki
  8. asukas
Down
  1. maallinen
  2. tosin/vaikka
  3. vilkaista
  4. constable
  5. child support
  6. hold back
  7. jäädä eläkkeelle

15 Clues: parishasukasmaallinenvilkaistaavoliittoconstablekyyristyänervouslyhold backtosin/vaikka(arvo)merkkichild supportsocial securityjäädä eläkkeellekevyt/pinnallinen

fnaf security breach 2022-02-24

fnaf security breach crossword puzzle
Across
  1. the security guard
  2. lazer gun
  3. sun and moon
  4. found in each office
  5. aligator
Down
  1. the spider in the vents
  2. the Dj of the west arcade
  3. wolf
  4. bear
  5. the "red light green light bots"
  6. dancing rabit lady
  7. chicken
  8. no flash photography

13 Clues: wolfbearchickenaligatorlazer gunsun and moonthe security guarddancing rabit ladyno flash photographyfound in each officethe spider in the ventsthe Dj of the west arcadethe "red light green light bots"

Safety and Security 2023-10-25

Safety and Security crossword puzzle
Across
  1. What is it called when someone receives an email from a fraudster pretending to be from a reputable company in order to obtain personal information?
  2. How much is the total teller drawer limit at a branch without TCRs?
  3. What is the morning glory alarm code?
  4. What is the Metro Region's safe word for Banker's Security?
  5. When can you plug a flash drive into your computer?
Down
  1. What kind of control is needed to log and process night drop?
  2. Where is the robbery kit located at EVERY branch?
  3. How many associates need to be present at open and close?
  4. How much is the teller top drawer cash limit?
  5. What is it called when a robber follows you in to the branch at open?
  6. What phone number do you call after a robbery when it is safe to do so?
  7. What percentage of elder abuse is committed by a family member?
  8. What month is CCBs Safety and Security month?

13 Clues: What is the morning glory alarm code?How much is the teller top drawer cash limit?What month is CCBs Safety and Security month?Where is the robbery kit located at EVERY branch?When can you plug a flash drive into your computer?How many associates need to be present at open and close?What is the Metro Region's safe word for Banker's Security?...

Safety and Security 2023-03-09

Safety and Security crossword puzzle
Across
  1. If you see a _________ person and they seem unapproachable, do not make contact.
  2. When using the _________ button at the door, make sure the door is securely shut before walking on.
  3. If the person seems unpleasant or abusive, do not ______.
  4. It may be necessary to provide a ____________ of the suspicious person. Take note of things like, gender, hair color, race, clothing, unique characteristics.
  5. If safe to do so, __________ the suspicious person from a distance.
  6. All visitors must always be __________ through the laboratory.
Down
  1. Never let anyone ___________ after you, when entering the facility.
  2. If you are trying to report a suspicious person and a supervisor is unavailable, report it to the ____________ Administrative Office or the Bureau Chief.
  3. If you see someone without a badge and they seem unapproachable, report it to a _______.
  4. All ___________ must sign in and out at the building 4 entrance.
  5. If you are working during non-business hours, you must sign in AND______.
  6. If you see someone not wearing a _______ and they seem approachable, ask them if you can help them.
  7. Direct all deliveries to be taken to the ______.

13 Clues: Direct all deliveries to be taken to the ______.If the person seems unpleasant or abusive, do not ______.All visitors must always be __________ through the laboratory.All ___________ must sign in and out at the building 4 entrance.Never let anyone ___________ after you, when entering the facility....

FNaF Security Breach 2022-05-31

FNaF Security Breach crossword puzzle
Across
  1. Caused Freddy's Mental Crisis
  2. Such a nice fello
  3. Protagonist
  4. Night Guard
  5. The "Best" of the 4
  6. A White Bird
  7. Furry
  8. The Orange Bear with a thunderbolt
Down
  1. The Tidy & Light-Sensitive One
  2. Wind-up vent annoyance
  3. Aligator
  4. MOLTEN FREDDY?!?!
  5. DARNIT HE CAME BACK!

13 Clues: FurryAligatorProtagonistNight GuardA White BirdSuch a nice felloMOLTEN FREDDY?!?!The "Best" of the 4DARNIT HE CAME BACK!Wind-up vent annoyanceCaused Freddy's Mental CrisisThe Tidy & Light-Sensitive OneThe Orange Bear with a thunderbolt

FNaF Security Breach 2022-05-31

FNaF Security Breach crossword puzzle
Across
  1. Caused Freddy's Mental Crisis
  2. Such a nice fello
  3. Protagonist
  4. Night Guard
  5. The "Best" of the 4
  6. A White Bird
  7. Furry
  8. The Orange Bear with a thunderbolt
Down
  1. The Tidy & Light-Sensitive One
  2. Wind-up vent annoyance
  3. Aligator
  4. MOLTEN FREDDY?!?!
  5. DARNIT HE CAME BACK!

13 Clues: FurryAligatorProtagonistNight GuardA White BirdSuch a nice felloMOLTEN FREDDY?!?!The "Best" of the 4DARNIT HE CAME BACK!Wind-up vent annoyanceCaused Freddy's Mental CrisisThe Tidy & Light-Sensitive OneThe Orange Bear with a thunderbolt

Information Security Crossword 2024-10-28

Information Security Crossword crossword puzzle
Across
  1. An attack that exploits software flaws before developers can release a patch or fix.
  2. The process of confirming the identity of a user, typically before granting access to resources.
  3. An unauthorized action that exposes, steals, or compromises data from a system.
  4. The process of testing a system, network, or web application to find security vulnerabilities.
  5. A cryptographic process of converting data into unreadable code to protect it from unauthorized access.
  6. A security mechanism that prevents unauthorized access to a network by filtering traffic.
  7. A type of malicious software designed to gain unauthorized access to a computer system.
Down
  1. A program that secretly records everything typed on a computer, usually for malicious purposes.
  2. A cyberattack where the perpetrator floods a server with excessive traffic
  3. A malicious attack where data is encrypted by criminals to demand payment for its release.
  4. Which term is used to describe the “cargo” that malware brings with it when it infects a device?
  5. What is a term for a group of computers that is networked together and used by hackers to steal information?
  6. A malicious program disguised as legitimate software, often used to gain unauthorized access.

13 Clues: A cyberattack where the perpetrator floods a server with excessive trafficAn unauthorized action that exposes, steals, or compromises data from a system.An attack that exploits software flaws before developers can release a patch or fix.A type of malicious software designed to gain unauthorized access to a computer system....

Security Fortnight Crossword 2025-07-18

Security Fortnight Crossword crossword puzzle
Across
  1. Protective footwear used in hazardous work environments.
  2. Regular rounds to monitor and ensure safety.
  3. Vehicle used to transport patients in emergencies.
  4. Physical inspection by patting down a person.
  5. Tunnel-like device that inspects bags using X-rays.
Down
  1. Scans individuals for hidden metallic objects.
  2. Initial treatment provided before medical professionals arrive.
  3. Door Clearly marked route for emergency evacuation.
  4. Group trained to act quickly during emergencies.
  5. Provides support while ascending or descending stairs.
  6. Used to block or control access temporarily.
  7. Gaining unauthorized access by closely following someone.
  8. Activates during power failure to guide evacuation.

13 Clues: Used to block or control access temporarily.Regular rounds to monitor and ensure safety.Physical inspection by patting down a person.Scans individuals for hidden metallic objects.Group trained to act quickly during emergencies.Vehicle used to transport patients in emergencies.Door Clearly marked route for emergency evacuation....

spainsh 10 2025-03-18

spainsh 10 crossword puzzle
Across
  1. purse/bag
  2. customs
  3. airplane
  4. agent
  5. ticket
  6. disposabel camera
  7. ATM machine
  8. wallet
  9. luggage
Down
  1. security checkpoint
  2. ID badge
  3. arrival
  4. airport
  5. airplane ticket
  6. money

15 Clues: agentmoneyticketwalletarrivalcustomsairportluggageID badgeairplanepurse/bagATM machineairplane ticketdisposabel camerasecurity checkpoint

The Good, The Bad, And The Ugly 2015-04-19

The Good, The Bad, And The Ugly crossword puzzle
Across
  1. The not-so-good aspects from social media.
  2. This skill is tested when social media comes into play.
  3. Justice This is achieved through the various channels of social media.
  4. The positive aspects that arise from social media.
  5. Fake relationships.
  6. The rumors that are spread are sent though this.
  7. The worst effects from social media.
Down
  1. This is improved through a world wide data base for information.
  2. Crude pictures with harmful captions.
  3. The improved communication through technology.
  4. Bullying Bullying over social media.
  5. Hackers are now easily able to invade this.

12 Clues: Fake relationships.Bullying Bullying over social media.The worst effects from social media.Crude pictures with harmful captions.The not-so-good aspects from social media.Hackers are now easily able to invade this.The improved communication through technology.The rumors that are spread are sent though this....

The Fourth Stall 2023-10-10

The Fourth Stall crossword puzzle
Across
  1. The Place in which Mac's business takes place
  2. The Bully that starts all the rumors.
  3. The main Protagonist of the story
  4. The place that Staples takes Mac to get beaten up. Supposedly haunted
Down
  1. Middle school bully. He gets called "deranged"
  2. The cyber bully
  3. The main antagonist of the story
  4. Mac's bodyguard that keeps him out of trouble
  5. What Barnaby Willis is known as
  6. Staples' Right hand man, normally beats up Mac
  7. Mac's best friend
  8. Staples' inside man on Mac, turns goo in the end

12 Clues: The cyber bullyMac's best friendWhat Barnaby Willis is known asThe main antagonist of the storyThe main Protagonist of the storyThe Bully that starts all the rumors.Mac's bodyguard that keeps him out of troubleThe Place in which Mac's business takes placeMiddle school bully. He gets called "deranged"Staples' Right hand man, normally beats up Mac...

Communication in the future 2024-11-24

Communication in the future crossword puzzle
Across
  1. room A place online where people talk.
  2. difference When people from different places do things differently.
  3. To talk or work with someone.
  4. phone A phone with a wire at home or work.
  5. channel A way to send or get messages.
  6. world The internet and things we do online.
  7. Pictures, sounds, and videos together.
Down
  1. Talking with someone in person.
  2. breakdown When people cannot understand each other.
  3. To talk or share ideas with someone.
  4. board A website where people leave messages.
  5. barrier When people cannot understand each other’s language.
  6. language Using hands and face to show ideas.

13 Clues: To talk or work with someone.Talking with someone in person.To talk or share ideas with someone.Pictures, sounds, and videos together.channel A way to send or get messages.breakdown When people cannot understand each other.phone A phone with a wire at home or work.room A place online where people talk....

9GEO FOOD- Noah Lawrence 2017-09-14

9GEO FOOD- Noah Lawrence crossword puzzle
Across
  1. Long term weather effect
  2. An edible substance
  3. The practice of growing and farming crops
  4. A substance providing nourishment
  5. A liquid essential to life
Down
  1. Factors of an areas food security
  2. The condition defining the difference between plant and animals from inorganic materials
  3. A catastrophe causing large damage or loss of life
  4. In short supply of something
  5. being free from danger or threat
  6. Growing, advancing, etc
  7. A factor relating to wealth

12 Clues: An edible substanceGrowing, advancing, etcLong term weather effectA liquid essential to lifeA factor relating to wealthIn short supply of somethingbeing free from danger or threatFactors of an areas food securityA substance providing nourishmentThe practice of growing and farming cropsA catastrophe causing large damage or loss of life...

You Don't Know What You Don't Know 2021-01-12

You Don't Know What You Don't Know crossword puzzle
Across
  1. Needs to be posted by 5pm Wednesday, February 3rd
  2. Provides PD opportunities for staff for all of MCPS
  3. Link to email grade sheets to parents through Synergy
  4. Publishes a Professional Newsletter regularly
  5. Long Term Sub in AOHP
Down
  1. Who will receive PDF of "Mark Verification by Teacher" report
  2. Birthday on January 22
  3. A 2nd Semester 1.0 Position recently posted
  4. The # of rounds to find a Cyber Teacher
  5. Color of the Edit Final Grade option in Synergy
  6. Where you register for staff development trainings

11 Clues: Long Term Sub in AOHPBirthday on January 22The # of rounds to find a Cyber TeacherA 2nd Semester 1.0 Position recently postedPublishes a Professional Newsletter regularlyColor of the Edit Final Grade option in SynergyNeeds to be posted by 5pm Wednesday, February 3rdWhere you register for staff development trainings...

Cyber-Bullying is a crime 2014-11-05

Cyber-Bullying is a crime crossword puzzle
Across
  1. Includes pushing, slapping or hitting someone
  2. A person harmed or injured
  3. Involves the use of communication technologies
  4. Exploitation (two words) includes sharing videos or photos with nudity of persons 18years and under
  5. Ready or likely to attack or confront
  6. Observer or spectator
Down
  1. Communication of a false statement that harms
  2. A person who has committed a crime
  3. The action of harming someone because they have harmed you
  4. Intentional behavior which is found threatening or disturbing
  5. Carried out because of despair

11 Clues: Observer or spectatorA person harmed or injuredCarried out because of despairA person who has committed a crimeReady or likely to attack or confrontCommunication of a false statement that harmsIncludes pushing, slapping or hitting someoneInvolves the use of communication technologiesThe action of harming someone because they have harmed you...

Airport 2022-05-18

Airport crossword puzzle
Across
  1. baggage
  2. place
  3. paper
  4. entering
  5. Control
  6. vehicle
  7. official
  8. baggage
Down
  1. GOL
  2. arriving
  3. womens'
  4. leaving
  5. car
  6. agents
  7. people

15 Clues: GOLcarplacepaperagentspeoplebaggagewomens'leavingControlvehiclebaggagearrivingenteringofficial

Unit 5 - Architechture 2014-04-21

Unit 5 - Architechture crossword puzzle
Across
  1. Lift
  2. Ziegelstein
  3. Werkzeug
  4. Kilometer
  5. Architekt/in
  6. entwerfen,entworf
  7. Wärme
  8. Termin
  9. Verbindung
  10. Stahl
  11. Stadtsilhouette
  12. ungewöhnlich
  13. Baustelle
  14. Decke
Down
  1. Stockwerk
  2. Wolkenkratzer
  3. Klimaanlage
  4. pünktlich
  5. Kühlschrank
  6. Beleuchtung
  7. Sicherheit
  8. Geschäftsmann
  9. anstatt
  10. Angst
  11. Herausforderung
  12. Bauland
  13. Eisen
  14. Lohn

28 Clues: LiftLohnWärmeAngstStahlEisenDeckeTerminanstattBaulandWerkzeugStockwerkKilometerpünktlichBaustelleSicherheitVerbindungZiegelsteinKlimaanlageKühlschrankBeleuchtungArchitekt/inungewöhnlichWolkenkratzerGeschäftsmannHerausforderungStadtsilhouetteentwerfen,entworf

8A Vocab pg 422 2014-05-18

8A Vocab pg 422 crossword puzzle
Across
  1. closed
  2. customs
  3. passport
  4. pilot
  5. suitcase
  6. foreign
  7. to check
  8. aisle
  9. announcement
  10. arrival
  11. ready
  12. to insist
  13. to board
Down
  1. passenger
  2. to last
  3. luggage
  4. security checkpoint
  5. departure
  6. to plan
  7. tourist
  8. delay
  9. direct
  10. airport
  11. employee
  12. flight
  13. open

26 Clues: openpilotdelayaislereadycloseddirectflightto lastluggagecustomsto plantouristforeignairportarrivalpassportsuitcaseemployeeto checkto boardpassengerdepartureto insistannouncementsecurity checkpoint

Government Acronyms 2023-01-21

Government Acronyms crossword puzzle
Across
  1. inner-city home development
  2. parcel
  3. retaliation force
  4. security alliance
  5. investigation
  6. intelligence
  7. Aeronautics
  8. global peace-makers
  9. pills
Down
  1. mail
  2. plant police
  3. covid monsters
  4. banks
  5. attorneys
  6. disaster relief
  7. financing paintings
  8. farm loans
  9. taxes
  10. labor relations
  11. water and air
  12. snow plows

21 Clues: mailbankstaxespillsparcelattorneysfarm loanssnow plowsAeronauticsplant policeintelligenceinvestigationwater and aircovid monstersdisaster relieflabor relationsretaliation forcesecurity alliancefinancing paintingsglobal peace-makersinner-city home development

Airport Spanish Vocab - Reya C 2022-10-13

Airport Spanish Vocab - Reya C crossword puzzle
Across
  1. passenger
  2. airplane
  3. gate
  4. monitor;screen
  5. suitcase
  6. can you please tell me where
  7. security
  8. train station
  9. ticket
  10. tourist office
Down
  1. flight attendant
  2. intinerary
  3. passport
  4. to call someone
  5. line
  6. swimsuit
  7. to take a trip
  8. to get in line
  9. departure
  10. to board

20 Clues: linegateticketpassportswimsuitairplanesuitcasesecurityto boardpassengerdepartureintinerarytrain stationmonitor;screento take a tripto get in linetourist officeto call someoneflight attendantcan you please tell me where

French Vocab Crossword 2020-01-12

French Vocab Crossword crossword puzzle
Across
  1. check in kiosk
  2. transfer
  3. male flight attendant
  4. plane
  5. boarding pass
  6. ticket counter
  7. ticket
  8. airport
  9. flight
  10. to land
Down
  1. boarding gate
  2. passenger
  3. female flight attendant
  4. customs
  5. suitcase
  6. passport
  7. agent
  8. verify
  9. identification
  10. security check
  11. take off
  12. to serve

22 Clues: agentplaneverifyticketflightcustomsairportto landsuitcasepassporttransfertake offto servepassengerboarding gateboarding passidentificationcheck in kiosksecurity checkticket countermale flight attendantfemale flight attendant

Woordjes 2023-12-06

Woordjes crossword puzzle
Across
  1. inbraak
  2. verdacht
  3. beroving
  4. roekeloos
  5. gewelddadig
  6. verdacht
  7. aggressief
  8. overtreding
  9. per ongeluk
  10. dreiging
  11. getuige
  12. moorde
  13. rechter
  14. bewapend
  15. rechtzaak
  16. beveiliging
Down
  1. rechtzaak
  2. straf
  3. slachtoffer
  4. gerechtigheid
  5. onruststoker
  6. gebouw
  7. brandstichting
  8. dronken
  9. toeschouwer
  10. hulpverleners
  11. aanval
  12. uitspraak
  13. bewijs
  14. rel

30 Clues: relstrafgebouwaanvalbewijsmoordeinbraakdronkengetuigerechterverdachtberovingverdachtdreigingbewapendrechtzaakroekeloosuitspraakrechtzaakaggressiefslachtoffergewelddadigtoeschouwerovertredingper ongelukbeveiligingonruststokergerechtigheidhulpverlenersbrandstichting

vocabularry 2023-09-20

vocabularry crossword puzzle
Across
  1. Pengetahuan
  2. Cantik
  3. Kemampuan
  4. Dunia
  5. Keluarga
  6. Bodoh
  7. Benda
  8. Orang-orang
  9. Pengertian
  10. Kekuasaan
  11. Pemain
  12. Film
  13. Kesehatan
  14. Pendek
Down
  1. Keamanan
  2. Lembut
  3. Jelek
  4. Masyarakat
  5. Kecil
  6. Cerita
  7. Seni
  8. Industri
  9. Besar
  10. Masalah
  11. Ekonomi
  12. Alam
  13. Tinggi
  14. Pintar

28 Clues: SeniAlamFilmJelekDuniaKecilBodohBesarBendaLembutCantikCeritaTinggiPemainPendekPintarMasalahEkonomiKeamananKeluargaIndustriKemampuanKekuasaanKesehatanMasyarakatPengertianPengetahuanOrang-orang

SP8 Unit 7 2024-05-10

SP8 Unit 7 crossword puzzle
Across
  1. ongelma
  2. persoonallisuus
  3. epäystävällinen
  4. keskustelu
  5. häpeissään
  6. pyytää anteeksi
  7. ilman
  8. kommentti
  9. luvata
  10. ongelmat, hankaluudet
  11. keskustella
Down
  1. käyttäytyä
  2. antaa anteeksi
  3. skandaali
  4. kiusallinen, nolo
  5. lupa
  6. salasana
  7. keskusta
  8. roska, pötypuhe
  9. turvallisuus
  10. kateellinen
  11. muistaa
  12. pettää
  13. ihastus
  14. selittää
  15. uskoa
  16. rasistinen

27 Clues: lupailmanuskoapettääluvataongelmamuistaaihastussalasanakeskustaselittääskandaalikommenttikäyttäytyäkeskusteluhäpeissäänrasistinenkateellinenkeskustellaturvallisuusantaa anteeksipersoonallisuusroska, pötypuheepäystävällinenpyytää anteeksikiusallinen, noloongelmat, hankaluudet

Economics Vocabulary 2024-03-04

Economics Vocabulary crossword puzzle
Across
  1. allowances/dependents
  2. permanent workers/residents
  3. taken out
  4. collectors
  5. tax season
  6. income based
  7. before
Down
  1. reports withholdings
  2. self employed
  3. national programs
  4. money generated
  5. medicare/social security
  6. illegal fraud
  7. money received
  8. after
  9. hourly
  10. money earned minus deductions
  11. contribution
  12. annual
  13. verifies employment

20 Clues: afterhourlyannualbeforetaken outcollectorstax seasoncontributionincome basedself employedillegal fraudmoney receivedmoney generatednational programsverifies employmentreports withholdingsallowances/dependentsmedicare/social securitypermanent workers/residentsmoney earned minus deductions

Advisor 2023-10-17

Advisor crossword puzzle
Across
  1. N
  2. E
  3. G
  4. AF
  5. V
  6. C
  7. B
  8. O
  9. W
  10. C
  11. AC
  12. AB
  13. U
  14. T
Down
  1. K
  2. AD
  3. AE
  4. H
  5. Z
  6. M
  7. P
  8. Q
  9. L
  10. AA
  11. J
  12. F
  13. I
  14. D
  15. R
  16. A

30 Clues: KNEHZGMPVQLCBOJWFCIDRAUTADAEAFAAACAB

p.28-29 2025-04-15

p.28-29 crossword puzzle
Across
  1. удобство
  2. мягкий
  3. чемодан
  4. взять, поднять
  5. ___car, bus, plane
  6. запыхавшись
  7. огромный
  8. взлет
  9. следовать
  10. ____of schedule раньше графика
Down
  1. выяснить
  2. место (в самолете)
  3. безопасность
  4. очередь
  5. вагон-ресторан
  6. садиться на борт
  7. знак
  8. выход
  9. отправиться в путешествие
  10. средневековый
  11. приземляться
  12. относительно

22 Clues: знаквыходвзлетмягкийчемоданочередьвыяснитьудобствоогромныйследоватьзапыхавшисьбезопасностьприземлятьсяотносительносредневековыйвагон-ресторанвзять, поднятьсадиться на бортместо (в самолете)___car, bus, planeотправиться в путешествие____of schedule раньше графика

Bahasa Indonesia BIPA B2 2025-11-20

Bahasa Indonesia BIPA B2 crossword puzzle
Across
  1. headache
  2. close
  3. plane
  4. usually
  5. interested
  6. shopping
  7. west
  8. circle/round
  9. nose
  10. unfortunately
  11. waiter
  12. holiday
  13. grandmother
  14. straight
Down
  1. eyes
  2. across
  3. train
  4. head
  5. north
  6. grandfather
  7. teacher
  8. far
  9. airport
  10. security
  11. south
  12. bored
  13. turn
  14. sea
  15. east

29 Clues: farseaeyesheadwestnoseturneasttrainnorthcloseplanesouthboredacrosswaiterteacherusuallyairportholidayheadacheshoppingsecuritystraightinterestedgrandfathergrandmothercircle/roundunfortunately

Cyber safety-AGNES MATRIN 2016-05-26

Cyber safety-AGNES MATRIN crossword puzzle
Across
  1. information about a particular subject that is available on the internet
  2. an ad that comes up on a device randomly
  3. a piece of information
  4. the fact of being who or what a person is
  5. helps you when inappropriate things come up on a device at home
  6. data from one computer system
  7. security system
  8. secures a system from virus
Down
  1. a global computer network providing a variety of information
  2. the condition of being protected
  3. to enter your username or password
  4. a short article giving a description about a person
  5. that allows you to access into a system
  6. in a place or situation that allows you to do things without other people seeing you
  7. sending or posting mean messages
  8. a device that is connected to the internet
  9. damaging systems

17 Clues: security systemdamaging systemsa piece of informationsecures a system from virusdata from one computer systemthe condition of being protectedsending or posting mean messagesto enter your username or passwordthat allows you to access into a systeman ad that comes up on a device randomlythe fact of being who or what a person is...

Conspiring Cities of India 2018-03-08

Conspiring Cities of India crossword puzzle
Across
  1. From winds to cannons, forts to sands.
  2. Famous for its Cyber Hub, but also has a great Ambience.
  3. Diamond capital of India.
  4. Largest city of the smallest state.
Down
  1. Also known as "Saketa", one of the Saptapuri for Hindus.
  2. beaches and skyscrapers, virtual and real.
  3. 30 JEE aspirants gather here.
  4. Coromandel Coast of Bay of Bengal.

8 Clues: Diamond capital of India.30 JEE aspirants gather here.Coromandel Coast of Bay of Bengal.Largest city of the smallest state.From winds to cannons, forts to sands.beaches and skyscrapers, virtual and real.Also known as "Saketa", one of the Saptapuri for Hindus.Famous for its Cyber Hub, but also has a great Ambience.

ΣΧΟΛΙΚΟΣ ΕΚΦΟΒΙΣΜΟΣ (ΤΑΣΟΣ ΚΟΥΚΛΙΔΗΣ Α2) 2022-01-31

ΣΧΟΛΙΚΟΣ ΕΚΦΟΒΙΣΜΟΣ (ΤΑΣΟΣ ΚΟΥΚΛΙΔΗΣ Α2) crossword puzzle
Across
  1. ΕΝΑ ΠΙΘΑΝΟ ΜΕΡΟΣ ΠΟΥ ΜΠΟΡΕΙ ΝΑ ΓΙΝΕΙ Ο ΕΚΦΟΒΙΣΜΟΣ
  2. ΕΞΩ Η ... ΑΠΟ ΤΑ ΣΧΟΛΕΙΑ
  3. H ΟΡΟΛΟΓΙΑ ΑΥΤΟΥ ΠΟΥ ΔΕΧΕΤΑΙ BULLYING
  4. ΒΟΗΘΑΝΕ ΠΟΛΛΕΣ ΦΟΡΕΣ ΤΟΥΣ ΜΑΘΗΤΕΣ ΓΙΑ ΝΑ ΑΝΤΙΜΕΤΟΠΙΣΟΥΝ ΤΟΝ ΕΚΦΟΒΙΣΜΟ
  5. ΠΟΥ ΓΙΝΕΤΑΙ ΤΟ CYBER BULLΥING?
Down
  1. ΤΟ BULLYING ΣΤΑ ΕΛΛΗΝΙΚΑ
  2. ΤΟ ΑΤΟΜΟ ΤΟ ΟΠΟΙΟ ΑΣΚΕΙ BULLYING ΣΕ ΚΑΠΟΙΟΝ
  3. ΕΙΝΑΙ ΟΛΑ ΤΑ ΠΑΙΔΙΑ ΣΤΟ ΣΧΟΛΕΙΟ

8 Clues: ΤΟ BULLYING ΣΤΑ ΕΛΛΗΝΙΚΑΕΞΩ Η ... ΑΠΟ ΤΑ ΣΧΟΛΕΙΑΠΟΥ ΓΙΝΕΤΑΙ ΤΟ CYBER BULLΥING?ΕΙΝΑΙ ΟΛΑ ΤΑ ΠΑΙΔΙΑ ΣΤΟ ΣΧΟΛΕΙΟH ΟΡΟΛΟΓΙΑ ΑΥΤΟΥ ΠΟΥ ΔΕΧΕΤΑΙ BULLYINGΤΟ ΑΤΟΜΟ ΤΟ ΟΠΟΙΟ ΑΣΚΕΙ BULLYING ΣΕ ΚΑΠΟΙΟΝΕΝΑ ΠΙΘΑΝΟ ΜΕΡΟΣ ΠΟΥ ΜΠΟΡΕΙ ΝΑ ΓΙΝΕΙ Ο ΕΚΦΟΒΙΣΜΟΣΒΟΗΘΑΝΕ ΠΟΛΛΕΣ ΦΟΡΕΣ ΤΟΥΣ ΜΑΘΗΤΕΣ ΓΙΑ ΝΑ ΑΝΤΙΜΕΤΟΠΙΣΟΥΝ ΤΟΝ ΕΚΦΟΒΙΣΜΟ

Bullying Recap 2023-11-08

Bullying Recap crossword puzzle
Across
  1. ......... up to bulling!
  2. When a person seeks to harm, intimidate, or coerce someone
  3. A cause, explanation, or justification for an action or event
  4. Have been bullied in the last 12 months
Down
  1. Another type of bullying
  2. When someone says something hurtful once!
  3. A type of bullying
  4. How might being bullied make someone react?

8 Clues: A type of bullyingAnother type of bullying......... up to bulling!Have been bullied in the last 12 monthsWhen someone says something hurtful once!How might being bullied make someone react?When a person seeks to harm, intimidate, or coerce someoneA cause, explanation, or justification for an action or event

Kianasearch 6-18-24 2024-06-18

Kianasearch 6-18-24 crossword puzzle
Across
  1. NYC borough where the UGA photographer is moving to
  2. the type of attack on Ascension
  3. my underdog team for the euros
  4. the best way to cook an egg
Down
  1. my profile name on my peacock account
  2. the name of the Crystal that powers lightsabers
  3. the best person on Love Island Season 11
  4. “can somebody match my”

8 Clues: “can somebody match my”the best way to cook an eggmy underdog team for the eurosthe type of attack on Ascensionmy profile name on my peacock accountthe best person on Love Island Season 11the name of the Crystal that powers lightsabersNYC borough where the UGA photographer is moving to

Operate a personal computer 2025-05-24

Operate a personal computer crossword puzzle
Across
  1. Another name for the monitor
  2. Used to prevent a cyber attack
  3. The Ctrl and Alt keys are always used in combination with other keys.
  4. I am use to type
Down
  1. Command to copy
  2. Small portable device use to store files
  3. You use me to scan things
  4. The physical components of a computer system

8 Clues: Command to copyI am use to typeYou use me to scan thingsAnother name for the monitorUsed to prevent a cyber attackSmall portable device use to store filesThe physical components of a computer systemThe Ctrl and Alt keys are always used in combination with other keys.

How well do you know MUN. 2017-11-26

How well do you know MUN. crossword puzzle
Across
  1. Refers to the UN Security Council's five permanent members.
  2. What is the oldest Polish MUN?
  3. Council A body of 5 great powers, which can veto resolutions and 10 rotating member states, which makes decisions about international peace and security including the dispatch of UN peacekeeping forces.
  4. A change to a draft resolution that is on the floor.
  5. A document that has been passed by an organ of the UN that aims to address a particular problem or issue.
Down
  1. of Order These are used if you believe there was a mistake made in the rules of procedure.
  2. League of Nations At the very beginning, it was called ...
  3. Caucus A form of informal debate or consultations where delegates are not obliged to remain seated, but can walk around the room and negotiate matters with their fellow delegates.
  4. General The head of the MUN.
  5. Nations An organization of independent states formed in 1945 to promote international peace and security.

10 Clues: General The head of the MUN.What is the oldest Polish MUN?A change to a draft resolution that is on the floor.Refers to the UN Security Council's five permanent members.League of Nations At the very beginning, it was called ...of Order These are used if you believe there was a mistake made in the rules of procedure....

Unit 8 2024-05-08

Unit 8 crossword puzzle
Across
  1. Banks
  2. Japanese attack
  3. Youngest govenor
  4. Major crop
  5. Rural
  6. Transport
  7. Airplane
Down
  1. exports
  2. increase demand
  3. Social Security
  4. Civilian
  5. Agricultural
  6. Georgia representative
  7. Programs
  8. Insect

15 Clues: BanksRuralInsectexportsCivilianProgramsAirplaneTransportMajor cropAgriculturalincrease demandSocial SecurityJapanese attackYoungest govenorGeorgia representative

Unit 8 2024-05-08

Unit 8 crossword puzzle
Across
  1. Banks
  2. Japanese attack
  3. Youngest govenor
  4. Major crop
  5. Rural
  6. Transport
  7. Airplane
Down
  1. exports
  2. increase demand
  3. Social Security
  4. Civilian
  5. Agricultural
  6. Georgia representative
  7. Programs
  8. Insect

15 Clues: BanksRuralInsectexportsCivilianProgramsAirplaneTransportMajor cropAgriculturalincrease demandSocial SecurityJapanese attackYoungest govenorGeorgia representative

CYBERCRIME 2021-07-11

CYBERCRIME crossword puzzle
Across
  1. A politically- or ideologically-motivated cyber attack or hack.
  2. A way to access electonic system by bypassing some or all security mechanisms.
  3. A satellite navigation system that indentifies the precise lovation of the transmitting device.
  4. The practice of gathering, retaining, and analyzing computer-related data for investigative purposes.
  5. Malicious software, such as a virus or worm, that attacks a target computer.
  6. The overaching program that runs all the functions on a computer or other electronic device.
  7. A company that offers access the internet.
  8. A camera connectee to computer l, generally used to then stream videos to the internet.
  9. Resource to be accessed, often expressed as a time period.
  10. Very similar to viruses in that they are computer programs that replicatefunctional copies of themselves.
  11. The process ofnusing a
  12. Determining the identity or location of an attacker or an attacker's intermediary.
  13. The interdependent network of information technology, infrastructures that includes internet.
  14. Hardware or software designed to prevent unathorized users from accessing a computer system.
  15. A user name and password used to identify qn individual attempting to gain access to a restricted page or network.
  16. A network point that acts an entrance to another network
  17. A unique internet identifier registered
  18. An online journal.
  19. A program used to access the internet.
  20. Assurance that remains private and no one sees it except for those expected to see it.
  21. A program that masks something harmful, such as a worm or virus, that it carries into a device.
Down
  1. Attempting to mimic an official email from a trusted organization to lire individuals.
  2. Refer to someone who gains access to a system, software, or hardware without permission.
  3. A log that chronicles any changes made to a document, presentation, software applications, etc.
  4. A word, phrase, or collection of characters that must be entered correctly on a login page to access content in a restricted area.
  5. Are a botnet of comprised hosts, controlled by a single intentity.
  6. A unique internet identifier registered to an entity.
  7. An information packet sent from website to a web browser that records a user's activity on the website.
  8. algorithm against data to produce a numeric value that is representative that data.
  9. Stands for "Wireless Fidelity".
  10. A software robot that performs automated tasks.
  11. The act of one individual harrasing or intimidating another individual via the interner.
  12. Unsolicited advertising or other information sent out via email or other messaging service.
  13. A massed data that is used to describe large amounts of other internet data.
  14. A grou of computers that is linked to share data and othe information.
  15. A website that finds information across the Internet based on a set of search criteria.
  16. an entity.
  17. A network security measure in which information is encoded or scrambled prior to transmission.
  18. Hardwire, softwire, databases, and relevant documentation for information system at given point in time.
  19. The changes in data caused by an intruder or investigator accessing files and running applications or process.
  20. Aim to overwhelm the resources of a targeted system to crash that system.

41 Clues: an entity.An online journal.The process ofnusing aStands for "Wireless Fidelity".A program used to access the internet.A unique internet identifier registeredA company that offers access the internet.A software robot that performs automated tasks.A unique internet identifier registered to an entity....

Return of ISIS Fighters who are Canadian Back to Canada Worksheet 2019-10-18

Return of ISIS Fighters who are Canadian Back to Canada Worksheet crossword puzzle
Across
  1. ISIS aims to create an _____ _____across Iraq, Syria and beyond.
  2. ISIS is trying to implement what type of law?
  3. ISIS fighters want to return back as the conditions in the prison camps are_____ for their families.
  4. Many security experts reported that this is a major ______ threat for Canada
  5. What does the acronym ISIS stand for?
  6. ISIS is a splinter sell of _______.
  7. Currently Canada is providing ______ ______ centers to rehabilitate ISIS fighters.
  8. ISIS is classified as what type of group?
Down
  1. ISIL stands for?
  2. Foreign women that marry ISIS fighters
  3. Women that marry ISIS fighters often meet them ________.
  4. Currently in Canada you can be persecuted for _______ if you try to leave to join ISIS, and get caught before you are able to.
  5. Canadian government is struggling to prosecute ISIS fighters due to lack of what?
  6. Currently the High Risk Returnee Interdepartmental Taskforce with help of the ______ is providing security and monitoring for returned ISIS fighters, as they go through rehabilitation programs.

14 Clues: ISIL stands for?ISIS is a splinter sell of _______.What does the acronym ISIS stand for?Foreign women that marry ISIS fightersISIS is classified as what type of group?ISIS is trying to implement what type of law?Women that marry ISIS fighters often meet them ________.ISIS aims to create an _____ _____across Iraq, Syria and beyond....

cybersicuritie eng briac 2024-03-13

cybersicuritie eng briac crossword puzzle
Across
  1. A barrier against network threats
  2. Harmful software
  3. is a network of private computers that have been infected with malicious software and are controlled as a group without the owners' knowledge.
  4. Fixing software vulnerabilities
  5. Protection against online threats
  6. Leaking sensitive information have 1 space (_)
  7. Unauthorized access
Down
  1. Double security confirmation for login have 1 space (_)
  2. Online assault
  3. Weakness in security
  4. Tricking people to reveal private information
  5. Scrambling data to keep it secret

12 Clues: Online assaultHarmful softwareUnauthorized accessWeakness in securityFixing software vulnerabilitiesA barrier against network threatsScrambling data to keep it secretProtection against online threatsTricking people to reveal private informationLeaking sensitive information have 1 space (_)Double security confirmation for login have 1 space (_)...

Digital Responsibility 2018-09-07

Digital Responsibility crossword puzzle
Across
  1. what do you keep safe
  2. what do you do when you see someone get cyber bullied
  3. never believe what online
  4. Important to you
  5. When you are getting weird messages who do you tell
  6. if you see someone you know online getting harrassed what do you do
  7. who do you not meet up with online
  8. who do you be nice to online
Down
  1. what do you not post
  2. who do you not talk too
  3. what never leaves the internet
  4. what do you do before you post

12 Clues: Important to youwhat do you not postwhat do you keep safewho do you not talk toonever believe what onlinewho do you be nice to onlinewhat never leaves the internetwhat do you do before you postwho do you not meet up with onlineWhen you are getting weird messages who do you tellwhat do you do when you see someone get cyber bullied...

The Good, The Bad, And The Ugly 2015-04-19

The Good, The Bad, And The Ugly crossword puzzle
Across
  1. Bullying Bullying over social media.
  2. Fake relationships.
  3. The improved communication through technology.
  4. Crude pictures with harmful captions.
  5. The rumors that are spread are sent though this.
  6. The not-so-good aspects from social media.
Down
  1. The worst effects from social media.
  2. This skill is tested when social media comes into play.
  3. This is improved through a world wide data base for information.
  4. Justice This is achieved through the various channels of social media.
  5. The positive aspects that arise from social media.
  6. Hackers are now easily able to invade this.

12 Clues: Fake relationships.The worst effects from social media.Bullying Bullying over social media.Crude pictures with harmful captions.The not-so-good aspects from social media.Hackers are now easily able to invade this.The improved communication through technology.The rumors that are spread are sent though this....

malware 2023-06-19

malware crossword puzzle
Across
  1. your definition of unauthorized access data
  2. using the internet to talk to someone
  3. alows users to convert information
  4. online fraud that involves use of a malicious code
  5. sending emails or messages as fake companys
  6. trial of data when using the internet
Down
  1. network allows users to talk and make releationships
  2. when a person takes images or information
  3. malicious program sending through a network
  4. fraud crimes commited by cyberattackers
  5. constantlely getting messages or emails
  6. its a word phrase or numbers that allow you to enter things such as your phone tablet or computer

12 Clues: alows users to convert informationusing the internet to talk to someonetrial of data when using the internetfraud crimes commited by cyberattackersconstantlely getting messages or emailswhen a person takes images or informationyour definition of unauthorized access datamalicious program sending through a network...

Network Based Attacks 2025-01-31

Network Based Attacks crossword puzzle
Across
  1. intercepting two way communications between 2 parties
  2. exploiting weaknesses in ARP
  3. translates domain names into ip addresses
  4. capturing information from communications you shouldn't
  5. tools used to scan for vulnerabilities and open ports
Down
  1. cyber attack that first scans for vulnerabilities in a system
  2. exploits a vulnerability before vendor is aware of it
  3. identifies hosts in a network
  4. attack by stealing a session key or cookie
  5. posing as something you're not
  6. group of infected computers that work together without the owners knowledge
  7. denial of service attack

12 Clues: denial of service attackexploiting weaknesses in ARPidentifies hosts in a networkposing as something you're nottranslates domain names into ip addressesattack by stealing a session key or cookieintercepting two way communications between 2 partiesexploits a vulnerability before vendor is aware of it...

Respectful Relationships 2025-08-03

Respectful Relationships crossword puzzle
Across
  1. available on or performed using the internet
  2. that which is morally correct or just
  3. main means of mass communication
  4. way in which one acts or conducts oneself
  5. system of rules regulating the actions of its members
  6. sharing a nude or a naked selfie
  7. seek to harm, intimidate, or coerce
Down
  1. connection between 2 people
  2. process of receiving or giving systematic instruction, like school
  3. a feeling of deep admiration for someone
  4. forbidden by law, especially criminal law
  5. relating to the culture of computers, IT, and virtual reality

12 Clues: connection between 2 peoplemain means of mass communicationsharing a nude or a naked selfieseek to harm, intimidate, or coercethat which is morally correct or justa feeling of deep admiration for someoneway in which one acts or conducts oneselfforbidden by law, especially criminal lawavailable on or performed using the internet...

BULLYINH 2023-09-22

BULLYINH crossword puzzle
Across
  1. : ----- BULLYING; online bullying
  2. : ------ BULLYING; bullying someone with words
  3. : -------- BULLYING; harming someone's body
Down
  1. : A online service to help with bullying
  2. : --------- BULLYING: controlling someone's use of money
  3. : someone who watches bullying happen

6 Clues: : ----- BULLYING; online bullying: someone who watches bullying happen: A online service to help with bullying: -------- BULLYING; harming someone's body: ------ BULLYING; bullying someone with words: --------- BULLYING: controlling someone's use of money

Solve Me M. 2023-08-11

Solve Me M. crossword puzzle
Across
  1. A's Easter Egg
  2. What did I put inside?
  3. What is missing from cyber?
Down
  1. What is the mistake in the treasure hunt?
  2. Colour of A's drink from clue 5?
  3. M's Easter Egg

6 Clues: A's Easter EggM's Easter EggWhat did I put inside?What is missing from cyber?Colour of A's drink from clue 5?What is the mistake in the treasure hunt?

Word formation 2024-02-24

Word formation crossword puzzle
Across
  1. used to eat
  2. with out this your phone wont open
  3. Our childhood incomplete with this
Down
  1. which is conducted in colleges
  2. used when you are laughing
  3. related to cyber attacks

6 Clues: used to eatrelated to cyber attacksused when you are laughingwhich is conducted in collegeswith out this your phone wont openOur childhood incomplete with this

Kaylynn Boggs - Bullying 2022-05-17

Kaylynn Boggs - Bullying crossword puzzle
Across
  1. name calling, insults, teasing, intimidation, homophobic or racist remarks
  2. happens more than once over a period of time
  3. what is the C in the ABCD's of bullying
  4. watching it happen
  5. hitting,kicking,tripping,pinching and pushing or damaging property.
  6. berate
  7. somebody is being hurt on purpose
  8. everybody is having fun,nobody gets hurt.
Down
  1. the attacker
  2. what is the D in the ABCD's of bullying
  3. being attacked
  4. Whats the A in the abcd's of bullying
  5. abusive or hurtful texts
  6. nobody is having fun,equal balance of power
  7. lying and spreading rumors playing nasty jokes to embarrass and humiliate
  8. Standing up for somebody
  9. of power whats the B in the abcd's of bullying

17 Clues: beratethe attackerbeing attackedwatching it happenabusive or hurtful textsStanding up for somebodysomebody is being hurt on purposeWhats the A in the abcd's of bullyingwhat is the D in the ABCD's of bullyingwhat is the C in the ABCD's of bullyingeverybody is having fun,nobody gets hurt.nobody is having fun,equal balance of power...

Financial Vocabulary 2013-10-13

Financial Vocabulary crossword puzzle
Across
  1. zatrzymać
  2. aktywa
  3. wypłacalność
  4. prowizja
  5. zasiłek social ........
  6. kapitał własny
  7. wyciągać (pieniądze z konta)
  8. bankomat
  9. oddział
  10. amortyzacja
  11. waluta
  12. czynsz
  13. tygodniówka
Down
  1. ustalanie ceny
  2. dźwignia finansowa
  3. zobowiązanie
  4. spółka
  5. wycena
  6. kredyt hipoteczny
  7. koszty nieprodukcyjne
  8. płynność finansowa
  9. inwentarz
  10. obrót
  11. podatek

24 Clues: obrótspółkaaktywawycenawalutaczynszoddziałpodatekprowizjabankomatzatrzymaćinwentarzamortyzacjatygodniówkazobowiązaniewypłacalnośćustalanie cenykapitał własnykredyt hipotecznydźwignia finansowapłynność finansowakoszty nieprodukcyjnezasiłek social ........wyciągać (pieniądze z konta)

Woordenschat Periode 6 Deel 3 2020-12-07

Woordenschat Periode 6 Deel 3 crossword puzzle
Across
  1. koningin
  2. mening
  3. maatregelen
  4. maatschappelijk
  5. oorlog
  6. scène, wereldje
  7. bibliotheek
  8. beleid
  9. veiligheid
  10. politiek
  11. privé
  12. moslims
  13. armoede
Down
  1. tiener
  2. macht, kracht
  3. systeem, stelsel
  4. interpretatie
  5. wet
  6. wettelijk
  7. plaatselijk, lokaal
  8. methode, manieren om iets te doen
  9. maatschappij
  10. arm
  11. getrouwd

24 Clues: wetarmprivétienermeningoorlogbeleidmoslimsarmoedekoninginpolitiekgetrouwdwettelijkveiligheidmaatregelenbibliotheekmaatschappijmacht, krachtinterpretatiemaatschappelijkscène, wereldjesysteem, stelselplaatselijk, lokaalmethode, manieren om iets te doen

words 2021-03-16

words crossword puzzle
Across
  1. 3d
  2. lähedal
  3. kohustuslik
  4. karistus
  5. kihlatud
  6. eelis
  7. ülemkohus
  8. au
  9. suudlema
  10. hull
  11. idioom
  12. haarama
  13. hapnik
  14. tähistamine
Down
  1. uusarendusala
  2. memoriaal
  3. padi
  4. suhtlemisoskused
  5. kohtamine(musimusi kalli kalli)
  6. something
  7. turvalisus
  8. somebody
  9. nõrk
  10. katuseala
  11. kandik
  12. asundus

26 Clues: 3daupadinõrkhulleelisidioomkandikhapniklähedalhaaramaasunduskaristuskihlatudsomebodysuudlemamemoriaalsomethingülemkohuskatusealaturvalisuskohustusliktähistamineuusarendusalasuhtlemisoskusedkohtamine(musimusi kalli kalli)

Smart moves 2 kpl 17 2017-05-10

Smart moves 2 kpl 17 crossword puzzle
Across
  1. osoittaa
  2. luokkakaveri
  3. lentää
  4. tuskin
  5. saapua (jonnekin)
  6. (tässä:) toimia
  7. lentokenttä
  8. varusteet, tavarat
  9. poikki, ’rättiväsynyt’
  10. kiivetä
  11. maisemat
  12. kotikaupunki
Down
  1. näky, näkeminen
  2. nuorisohotelli
  3. silti, kuitenkin
  4. kolkko
  5. ylellisyys
  6. lopen uupunut
  7. läpi
  8. innostunut, jännittynyt
  9. matkustaa
  10. turvatarkastus
  11. mennä joltakin ohi
  12. laskeutua

24 Clues: läpikolkkolentäätuskinkiivetäosoittaamaisematmatkustaalaskeutuaylellisyyslentokenttäluokkakaverikotikaupunkilopen uupunutnuorisohotelliturvatarkastusnäky, näkeminen(tässä:) toimiasilti, kuitenkinsaapua (jonnekin)varusteet, tavaratmennä joltakin ohipoikki, ’rättiväsynyt’innostunut, jännittynyt

english-dutch 141 2018-07-26

english-dutch 141 crossword puzzle
Across
  1. job
  2. always
  3. soup
  4. about
  5. sick
  6. security guards
  7. theory
  8. dangerous
  9. trained
  10. sure
  11. work area
  12. to asks, questions
  13. saturday
  14. airport
Down
  1. infected
  2. not
  3. no
  4. succcess
  5. stricter
  6. government
  7. selection days
  8. those
  9. almost, rather well
  10. locations
  11. complete
  12. something

26 Clues: nojobnotsoupsicksureaboutthosealwaystheorytrainedairportinfectedsucccessstrictercompletesaturdaylocationsdangeroussomethingwork areagovernmentselection dayssecurity guardsto asks, questionsalmost, rather well

9/11 2024-09-11

9/11 crossword puzzle
Across
  1. Patriotisme
  2. Avion
  3. Peur
  4. Survivant
  5. Attaque
  6. Sécurité
  7. Mémorial
  8. Enquête
  9. Pompiers
  10. Terrorisme
Down
  1. Victimes
  2. Vol
  3. Tours Jumelles
  4. Surveillance
  5. épicentre(site de l'attentat)
  6. Centre du Commerce Mondial
  7. Traumatisme
  8. Héroïsme
  9. Évacuation
  10. Détournement
  11. Invasion
  12. Pentagone
  13. Effondrement
  14. Crash
  15. Choc
  16. Sauvetage

26 Clues: VolPeurChocAvionCrashAttaqueEnquêteVictimesHéroïsmeInvasionSécuritéMémorialPompiersPentagoneSurvivantSauvetageÉvacuationTerrorismePatriotismeTraumatismeSurveillanceDétournementEffondrementTours JumellesCentre du Commerce Mondialépicentre(site de l'attentat)

Alfa Company 1st 2025-10-28

Alfa Company 1st crossword puzzle
Across
  1. 5 1911
  2. STAR-SPANGLED
  3. EDWIN ALEXANDER
  4. SELFLESS
  5. CODE
  6. DEFINITION OF
  7. PHONETIC
  8. SIR
  9. SIR
  10. CLOSED
  11. GENERAL
  12. LET US TRY
Down
  1. E-1
  2. REPORTING
  3. OPEN
  4. SAFETY S2
  5. E-4
  6. OF ALLEGIENCE
  7. SNAP
  8. TO ENCOURAGE
  9. CODE
  10. UNITED STATES
  11. VALUES
  12. STAFF

24 Clues: E-1E-4SIRSIROPENCODESNAPCODESTAFF5 1911VALUESCLOSEDGENERALSELFLESSPHONETICREPORTINGSAFETY S2LET US TRYTO ENCOURAGESTAR-SPANGLEDOF ALLEGIENCEDEFINITION OFUNITED STATESEDWIN ALEXANDER

IT Professions 2024-04-17

IT Professions crossword puzzle
Across
  1. Designs, develops, and maintains software applications or systems.
  2. Analyzes an organization's IT systems and processes to improve efficiency and functionality through technology solutions.
  3. Protects computer systems and networks from security breaches, investigates security incidents, and implements security measures to safeguard data.
  4. Analyzes and interprets complex data sets to extract insights and inform business decisions, using statistical analysis, machine learning, and data visualization techniques.
Down
  1. Designs and manages cloud computing infrastructure and solutions, including deployment, integration, and optimization of cloud services.
  2. Manages and maintains an organization's computer networks, including hardware, software, and security protocols.
  3. Administers, maintains, and secures databases, ensuring data integrity and accessibility.
  4. Oversees and manages IT projects from initiation to completion, ensuring they are delivered on time, within budget, and meet quality standards.
  5. Provides technical assistance, troubleshoots hardware and software issues, and assists users with IT-related problems.
  6. Designs, builds, and maintains websites and web applications using programming languages, frameworks, and technologies.

10 Clues: Designs, develops, and maintains software applications or systems.Administers, maintains, and secures databases, ensuring data integrity and accessibility.Manages and maintains an organization's computer networks, including hardware, software, and security protocols....

codi bullying crossword 2023-03-21

codi bullying crossword crossword puzzle
Across
  1. bullying getting physically picked on everyday
  2. bullying some teases you verbally everyday
  3. someone who stands around and watches someone getting bullied
  4. a sore from being punched or kicked
Down
  1. someone teases you and picks on you everyday
  2. a type of physical bullying
  3. a type of psychological bullying
  4. bullying getting picked on online everyday

8 Clues: a type of physical bullyinga type of psychological bullyinga sore from being punched or kickedsomeone teases you and picks on you everydaybullying some teases you verbally everydaybullying getting picked on online everydaybullying getting physically picked on everydaysomeone who stands around and watches someone getting bullied